Continuous Monitoring and Security Operations
Continuous Monitoring and Security Operations This course assesses the current state of security architecture and continuous monitoring, and provides a new approach to security architecture that can be easily understood and defended. When students finish, they have a list of action items in hand for making their organization one of the most effective vehicles for frustrating adversaries. Students are able to assess deficiencies in their own organization’s security architectures and affect meaningful changes that are continuously monitored for deviations from their expected security posture.( Online classes available) Course Key Learnings: Analyze modern hybrid enterprises for deficient protection/detection strategies Apply the […]